


default search action
Ryan G. Benton
Person information
- affiliation: University of South Alabama, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Dhanasak Bhumichai
, Christos Smiliotopoulos
, Ryan Benton
, Georgios Kambourakis
, Dimitrios Damopoulos
:
The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead. Inf. 15(5): 268 (2024) - [c56]Aleise H. McGowan, Scott M. Sittig, Ryan G. Benton, David M. Bourrie, M. Sriram Iyengar, Aysu Dalogullari:
Designing for diversity: Dynamic persuasive strategies in mHealth app development. BCSS 2024: 83-97 - [c55]Dhanasak Bhumichai, Ryan G. Benton:
The Evaluation of Extracted Features for Detecting Eclipse Attacks on Ethereum Network Layers. IEEE Big Data 2024: 5551-5560 - 2022
- [c54]Tom Johnsten, Aishwarya Prakash, Grant T. Daly, Ryan G. Benton
, Tristan Clark:
Computational framework for generating synthetic signal peptides. BCB 2022: 30:1-30:7 - 2021
- [j9]Dustin Mink
, Jeffrey Todd McDonald, Sikha Bagui, William Bradley Glisson, Jordan Shropshire, Ryan Benton
, Samuel H. Russ:
Near-Real-Time IDS for the U.S. FAA's NextGen ADS-B. Big Data Cogn. Comput. 5(2): 27 (2021) - [c53]Blake A. Johns, Ryan G. Benton
, Tom Johnsten, David M. Bourrie:
RARE: Rare Action Rule Exploration. IEEE BigData 2021: 2603-2610 - [c52]Joshua Hightower, William Bradley Glisson, Ryan Benton
, Jeffrey Todd McDonald:
Classifying Android Applications Via System Stats. IEEE BigData 2021: 5388-5394 - [c51]Alberto Alejandro Ceballos Delgado, William Bradley Glisson, Narasimha K. Shashidhar, Jeffrey Todd McDonald, George Grispos, Ryan Benton:
Deception Detection Using Machine Learning. HICSS 2021: 1-10 - [c50]Jeffrey Todd McDonald, Nathan Herron, William Bradley Glisson, Ryan Benton:
Machine Learning-Based Android Malware Detection Using Manifest Permissions. HICSS 2021: 1-10 - [c49]Thomas Watts, Ryan Benton, Jordan Shropshire, David Bourrie:
Insight from a Containerized Kubernetes Workload Introspection. HICSS 2021: 1-10 - 2020
- [j8]Edward Harshany, Ryan Benton, David Bourrie, William Bradley Glisson:
Big Data Forensics: Hadoop 3.2.0 Reconstruction. Digit. Investig. 32 Supplement: 300909 (2020) - [j7]Jian Li, Zelin Zhang, Shengyu Li, Ryan Benton
, Yulong Huang, Mohan Vamsi Kasukurthi, Dongqi Li, Jingwei Lin, Glen M. Borchert, Shaobo Tan, Gang Li, Bin Ma, Meihong Yang, Jingshan Huang:
A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology. BMC Medical Informatics Decis. Mak. 20-S(14): 297 (2020) - [j6]Bin Ma, Zhaolong Wu, Shengyu Li, Ryan Benton
, Dongqi Li, Yulong Huang, Mohan Vamsi Kasukurthi, Jingwei Lin, Glen M. Borchert, Shaobo Tan, Gang Li, Meihong Yang, Jingshan Huang:
Development of a support vector machine learning and smart phone Internet of Things-based architecture for real-time sleep apnea diagnosis. BMC Medical Informatics Decis. Mak. 20-S(14): 298 (2020) - [c48]Edward Harshany, Ryan Benton
, David Bourrie, Michael Black, William Bradley Glisson:
DFS3: automated distributed file system storage state reconstruction. ARES 2020: 43:1-43:10 - [c47]Suresh K. Choubey, Ryan Benton
, Tom Johnsten:
Dynamic Thresholding Leading to Optimal Inventory Maintenance. IEEE BigData 2020: 4112-4121 - [c46]Wyatt Green, Tom Johnsten, Ryan G. Benton
:
TADS: Transformation of Anomalies in Data Streams. IEEE BigData 2020: 4284-4292 - [c45]Alec Austin, Ryan Benton
:
Effects of Missing Members on Classifier Ensemble Accuracy. IEEE BigData 2020: 4998-5006 - [c44]Jordan Shropshire, Ryan Benton:
Container and VM Visualization for Rapid Forensic Analysis. HICSS 2020: 1-10 - [c43]CScott Brown, Ryan G. Benton
:
Decision Surfaces of Localized Classifiers. IJCNN 2020: 1-8
2010 – 2019
- 2019
- [j5]Bin Ma, Chunxiao Li, Zhaolong Wu, Yulong Huang, Ada Chaeli van der Zijp-Tan, Shaobo Tan, Dongqi Li, Ada Fong, Chandan Basetty, Glen M. Borchert, Ryan Benton
, Bin Wu, Jingshan Huang:
Muscle fatigue detection and treatment system driven by internet of things. BMC Medical Informatics Decis. Mak. 19-S(7): 275 (2019) - [j4]Robinette Renner, Shengyu Li, Yulong Huang, Ada Chaeli van der Zijp-Tan, Shaobo Tan, Dongqi Li, Mohan Vamsi Kasukurthi, Ryan Benton
, Glen M. Borchert, Jingshan Huang, Guoqian Jiang:
Using an artificial neural network to map cancer common data elements to the biomedical research integrated domain group model in a semi-automated manner. BMC Medical Informatics Decis. Mak. 19-S(7): 276 (2019) - [c42]Patrick Luckett, Thomas Watts, Jeffrey Todd McDonald, Lee M. Hively, Ryan Benton
:
A Deep Learning Approach to Phase-Space Analysis for Seizure Detection. BCB 2019: 190-196 - [c41]CScott Brown, Ryan G. Benton
:
Local Gaussian Process Features for Clinical Sensor Time Series. BIBM 2019: 1288-1295 - [c40]Mohan Vamsi Kasukurthi, Shengyu Li, Glen M. Borchert, Jingshan Huang, Dihua Zhang, Mika Housevera, Yulong Huang, Shaobo Tan, Bin Ma, Dongqi Li, Ryan Benton
, Jingwei Lin:
SURFr: Algorithm for identification and analysis of ncRNA-derived RNAs. BIBM 2019: 1504-1507 - [c39]Jian Li, Shaobo Tan, Bin Ma, Meihong Yang, Jingshan Huang, Zelin Zhang, Shengyu Li, Ryan Benton
, Yulong Huang, Mohan Vamsi Kasukurthi, Dongqi Li, Jingwei Lin, Glen M. Borchert:
Reversible Data Hiding Based Key Region Protection Method in Medical Images. BIBM 2019: 1526-1530 - [c38]Bin Ma, Shaobo Tan, Meihong Yang, Jingshan Huang, Zhaolong Wu, Shengyu Li, Ryan Benton
, Dongqi Li, Yulong Huang, Mohan Vamsi Kasukurthi, Jingwei Lin, Glen M. Borchert:
A SVM-Based Algorithm to Diagnose Sleep Apnea. BIBM 2019: 1556-1560 - [c37]Guanyi Yang, Ryan Benton
, Glen M. Borchert, Bin Ma, Jingshan Huang, Xiuyu Leng, Fangwan Huang, Mohan Vamsi Kasukurthi, Yulong Huang, Dongqi Li, Jingwei Lin, Shaobo Tan, Guiying Lu:
Use CPET data to predict the intervention effect of aerobic exercise on young hypertensive patients. BIBM 2019: 1699-1702 - [c36]Jay Lewis, Ryan G. Benton
, David Bourrie, Jennifer Lavergne:
Enhancing Itemset Tree Rules and Performance. IEEE BigData 2019: 1143-1150 - [c35]Suresh K. Choubey, Ryan G. Benton
, Tom Johnsten:
Prescriptive Equipment Maintenance: A Framework. IEEE BigData 2019: 4366-4374 - [c34]Tom Johnsten, Wyatt Green, Lowell Crook, Ho Yin Chan, Ryan G. Benton
, David M. Bourrie:
Discovery of Action Rules for Continuously Valued Data. CogMI 2019: 127-135 - [c33]Aviv Segev, Rituparna Datta, Ryan Benton
, Dorothy Curtis:
OINNIONN: outward inward neural network and inward outward neural network evolution. GECCO (Companion) 2019: 79-80 - [c32]Thomas Watts, Ryan Benton, William Bradley Glisson, Jordan Shropshire:
Insight from a Docker Container Introspection. HICSS 2019: 1-10 - 2018
- [j3]Patrick Luckett, Jeffrey Todd McDonald, William Bradley Glisson
, Ryan Benton
, Joel A. Dawson
, Blair A. Doyle:
Identifying stealth malware using CPU power consumption and learning algorithms. J. Comput. Secur. 26(5): 589-613 (2018) - [c31]Adam M. Gautier, Todd R. Andel
, Ryan Benton
:
On-Device Detection via Anomalous Environmental Factors. SSPREW@ACSAC 2018: 5:1-5:8 - [c30]Robinette Renner, Shengyu Li, Yulong Huang, Shaobo Tan, Dongqi Li, Ada Chaeli van der Zijp-Tan, Ryan Benton
, Glen M. Borchert, Jingshan Huang, Guoqian Jiang:
Mapping Common Data Elements to a Domain Model Using an Artificial Neural Network. BIBM 2018: 1532-1535 - [c29]Grant T. Daly, Ryan Benton
, Tom Johnsten:
A Multi-Objective Evolutionary Action Rule Mining Method. CEC 2018: 1-8 - [c28]Colby Parker, Jeffrey Todd McDonald, Tom Johnsten, Ryan G. Benton
:
Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models. MALWARE 2018: 49-58 - 2017
- [c27]Maureen Van Devender, William Bradley Glisson, Ryan Benton, George Grispos:
Understanding De-identification of Healthcare Big Data. AMCIS 2017 - [c26]Murali K. Pusala
, Ryan G. Benton
, Vijay V. Raghavan, Raju N. Gottumukkala:
Supervised approach to rank predicted links using interestingness measures. BIBM 2017: 1085-1092 - [c25]Shaaban Abbady, Cheng-Yuan Ke, Jennifer Lavergne, Jian Chen
, Vijay V. Raghavan, Ryan Benton
:
Online mining for association rules and collective anomalies in data streams. IEEE BigData 2017: 2370-2379 - [c24]Satya Katragadda, Ryan G. Benton, Vijay V. Raghavan:
Framework for Real-Time Event Detection using Multiple Social Media Sources. HICSS 2017: 1-10 - [c23]Satya Katragadda
, Ryan G. Benton
, Vijay V. Raghavan:
Sub-event detection from tweets. IJCNN 2017: 2128-2135 - [c22]Dustin Mink, William Bradley Glisson
, Ryan Benton
, Kim-Kwang Raymond Choo
:
Manipulating the Five V's in the Next Generation Air Transportation System. ATCS/SePrIoT@SecureComm 2017: 271-282 - 2016
- [c21]Satya Katragadda
, Shahid Virani, Ryan G. Benton
, Vijay V. Raghavan:
Detection of event onset using Twitter. IJCNN 2016: 1539-1546 - 2015
- [j2]Tom Johnsten, Laura Fain, Leanna Fain, Ryan G. Benton
, Ethan Butler, Lewis Pannell, Ming Tan
:
Exploiting multi-layered vector spaces for signal peptide detection. Int. J. Data Min. Bioinform. 13(2): 141-157 (2015) - [c20]Satya Katragadda
, Harika Karnati, Murali Pusala
, Vijay V. Raghavan, Ryan G. Benton
:
Detecting adverse drug effects using link classification on twitter data. BIBM 2015: 675-679 - [c19]Sonya H. Y. Hsu, Ryan Benton
, Raju N. Gottumukkala:
Real-Time Flu Monitoring System and Decision Informatics. HICSS 2015: 2794-2803 - 2013
- [j1]Murat Seckin Ayhan, Ryan G. Benton
, Vijay V. Raghavan, Suresh K. Choubey:
Exploitation of 3D stereotactic surface projection for predictive modelling of Alzheimer's disease. Int. J. Data Min. Bioinform. 7(2): 146-165 (2013) - [c18]Murat Seckin Ayhan, Ryan G. Benton
, Vijay V. Raghavan, Suresh K. Choubey:
Composite Kernels for Automatic Relevance Determination in Computerized Diagnosis of Alzheimer's Disease. Brain and Health Informatics 2013: 126-137 - [c17]Ryan G. Benton
, Suresh K. Choubey, David G. Clark, Tom Johnsten, Vijay V. Raghavan:
Diagnosis and Grading of Alzheimer's Disease via Automatic Classification of FDG-PET Scans. Brain and Health Informatics 2013: 266-276 - [c16]Tom Johnsten, Samy Alihamad, Ashwin Kannalath, Ryan G. Benton
:
Targeted Action Rule Discovery. ICMLA (1) 2013: 348-353 - [c15]Vijay V. Raghavan, Ryan G. Benton
, Tom Johnsten, Ying Xie:
Representations for Large-Scale Sequence Data Mining: A Tale of Two Vector Space Models. RSFDGrC 2013: 15-25 - [c14]Jennifer Lavergne, Ryan G. Benton
, Vijay V. Raghavan, Alaaeldin M. Hafez:
DynTARM: An In-Memory Data Structure for Targeted Strong and Rare Association Rule Mining over Time-Varying Domains. Web Intelligence 2013: 298-306 - 2012
- [c13]Murat Seckin Ayhan, Ryan G. Benton
, Vijay V. Raghavan, Suresh K. Choubey:
Utilization of domain-knowledge for simplicity and comprehensibility in predictive modeling of Alzheimer's disease. BIBM Workshops 2012: 265-272 - [c12]Jennifer Lavergne, Ryan G. Benton
, Vijay V. Raghavan:
Min-Max Itemset Trees for Dense and Categorical Datasets. ISMIS 2012: 51-60 - [c11]Jennifer Lavergne, Ryan G. Benton
, Vijay V. Raghavan:
TRARM-RelSup: Targeted Rare Association Rule Mining Using Itemset Trees and the Relative Support Measure. ISMIS 2012: 61-70 - 2011
- [c10]Can Akkoç, Tom Johnsten, Ryan G. Benton:
Multi-layered Vector Spaces for Classifying and Analyzing Biological Sequences. BICoB 2011: 160-166 - [c9]Djellel Eddine Difallah
, Ryan G. Benton
, Vijay V. Raghavan, Tom Johnsten:
FAARM: Frequent Association Action Rules Mining Using FP-Tree. ICDM Workshops 2011: 398-404 - 2010
- [c8]Murat Seckin Ayhan, Ryan G. Benton
, Vijay V. Raghavan, Suresh K. Choubey:
Exploitation of 3D Stereotactic Surface Projection for automated classification of Alzheimer's disease according to dementia levels. BIBM 2010: 516-519 - [c7]Blake Lemoine, Sara Rayburn, Ryan G. Benton
:
Data Fusion and Feature Selection for Alzheimer's Diagnosis. Brain Informatics 2010: 320-327
2000 – 2009
- 2007
- [c6]Mores Prachyabrued, Timothy Roden, Ryan G. Benton
:
Procedural generation of stylized 2D maps. Advances in Computer Entertainment Technology 2007: 147-150 - 2006
- [c5]Ryan Gene Benton, Chee-Hung Henry Chu:
Camera Pose Estimation by an Artificial Neural Network. ICONIP (2) 2006: 604-611 - 2005
- [c4]Ryan G. Benton
, Henry Chu:
Soft computing approach to steganalysis of LSB embedding in digital images. ITRE 2005: 105-109 - 2004
- [c3]Surendra Karnatapu, Karthik Ramachandran, Zonghuan Wu, Biren Shah, Vijay V. Raghavan, Ryan G. Benton:
Estimating Size of Search Engines in an Uncooperative Environment. Workshop on Web-based Support Systems 2004: 81-87 - 2000
- [c2]Ryan G. Benton
, Miroslav Kubat, Rasiah Loganantharaj:
Meta-classifiers and Selective Superiority. IEA/AIE 2000: 434-442
1990 – 1999
- 1995
- [c1]Ryan Gene Benton:
Using genetic algorithms to improve interpretation of satellite data. ACM Southeast Regional Conference 1995: 143-145
Coauthor Index
aka: William Bradley Glisson

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-25 23:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint